{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,25]],"date-time":"2025-12-25T07:25:30Z","timestamp":1766647530898,"version":"3.41.0"},"reference-count":52,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2018,6,13]],"date-time":"2018-06-13T00:00:00Z","timestamp":1528848000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"CME Group"},{"name":"Distributed Technologies Research Foundation"},{"name":"Jump Trading"},{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["CIF-1705007"],"award-info":[{"award-number":["CIF-1705007"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Input Output Hong Kong"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Meas. Anal. Comput. Syst."],"published-print":{"date-parts":[[2018,6,13]]},"abstract":"<jats:p>Recent work has demonstrated significant anonymity vulnerabilities in Bitcoin's networking stack. In particular, the current mechanism for broadcasting Bitcoin transactions allows third-party observers to link transactions to the IP addresses that originated them. This lays the groundwork for low-cost, large-scale deanonymization attacks. In this work, we present \\Algopp, a first-principles defense against large-scale deanonymization attacks with near-optimal information-theoretic guarantees. Dandelion++ builds upon a recent proposal called Dandelion that exhibited similar goals. However, in this paper, we highlight some simplifying assumptions made in Dandelion, and show how they can lead to serious deanonymization attacks when violated. In contrast, Dandelion++ defends against stronger adversaries that are allowed to disobey protocol. Dandelion++ is lightweight, scalable, and completely interoperable with the existing Bitcoin network. We evaluate it through experiments on Bitcoin's mainnet (i.e., the live Bitcoin network) to demonstrate its interoperability and low broadcast latency overhead.<\/jats:p>","DOI":"10.1145\/3224424","type":"journal-article","created":{"date-parts":[[2018,6,15]],"date-time":"2018-06-15T14:23:33Z","timestamp":1529072613000},"page":"1-35","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":36,"title":["Dandelion++"],"prefix":"10.1145","volume":"2","author":[{"given":"Giulia","family":"Fanti","sequence":"first","affiliation":[{"name":"CMU, Pittsburgh, USA"}]},{"given":"Shaileshh Bojja","family":"Venkatakrishnan","sequence":"additional","affiliation":[{"name":"MIT, Cambridge, USA"}]},{"given":"Surya","family":"Bakshi","sequence":"additional","affiliation":[{"name":"UIUC, Champaign, USA"}]},{"given":"Bradley","family":"Denby","sequence":"additional","affiliation":[{"name":"CMU, Pittsburgh, USA"}]},{"given":"Shruti","family":"Bhargava","sequence":"additional","affiliation":[{"name":"UIUC, Champaign, USA"}]},{"given":"Andrew","family":"Miller","sequence":"additional","affiliation":[{"name":"UIUC, Champaign, USA"}]},{"given":"Pramod","family":"Viswanath","sequence":"additional","affiliation":[{"name":"UIUC, Champaign, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,6,13]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"{n. d.}. AWS Regions and Endpoints. ({n. d.}). http:\/\/docs.aws.amazon.com\/general\/latest\/gr\/rande.html.  {n. d.}. AWS Regions and Endpoints. ({n. d.}). http:\/\/docs.aws.amazon.com\/general\/latest\/gr\/rande.html."},{"key":"e_1_2_1_2_1","unstructured":"{n. d.}. Bitcoin Core integration\/staging tree. ({n. d.}). https:\/\/github.com\/bitcoin\/bitcoin.  {n. d.}. Bitcoin Core integration\/staging tree. ({n. d.}). https:\/\/github.com\/bitcoin\/bitcoin."},{"key":"e_1_2_1_3_1","unstructured":"{n. d.}. Chainalysis. ({n. d.}). https:\/\/www.chainalysis.com\/.  {n. d.}. Chainalysis. ({n. d.}). https:\/\/www.chainalysis.com\/."},{"key":"e_1_2_1_4_1","unstructured":"{n. d.}. The Kovri I2P Router Project. ({n. d.}). https:\/\/github.com\/monero-project\/kovri.  {n. d.}. The Kovri I2P Router Project. ({n. d.}). https:\/\/github.com\/monero-project\/kovri."},{"key":"e_1_2_1_5_1","unstructured":"{n. d.}. Monero. ({n. d.}). https:\/\/getmonero.org\/home.  {n. d.}. Monero. ({n. d.}). https:\/\/getmonero.org\/home."},{"key":"e_1_2_1_6_1","unstructured":"2015. Bitcoin Core Commit 5400ef6. (2015). https:\/\/github.com\/bitcoin\/bitcoin\/commit\/ 5400ef6bcb9d243b2b21697775aa6491115420f3.  2015. Bitcoin Core Commit 5400ef6. (2015). https:\/\/github.com\/bitcoin\/bitcoin\/commit\/ 5400ef6bcb9d243b2b21697775aa6491115420f3."},{"key":"e_1_2_1_7_1","unstructured":"2016. reddit\/r\/monero. (2016). https:\/\/www.reddit.com\/r\/Monero\/comments\/4aki0k\/what_is_the_status_of_monero_ and_i2p\/.  2016. reddit\/r\/monero. (2016). https:\/\/www.reddit.com\/r\/Monero\/comments\/4aki0k\/what_is_the_status_of_monero_ and_i2p\/."},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39884-1_4"},{"key":"e_1_2_1_9_1","volume-title":"Hijacking Bitcoin: Large-scale Network Attacks on Cryptocurrencies. arXiv preprint arXiv:1605.07524","author":"Apostolaki Maria","year":"2016","unstructured":"Maria Apostolaki , Aviv Zohar , and Laurent Vanbever . 2016 . Hijacking Bitcoin: Large-scale Network Attacks on Cryptocurrencies. arXiv preprint arXiv:1605.07524 (2016). Maria Apostolaki, Aviv Zohar, and Laurent Vanbever. 2016. Hijacking Bitcoin: Large-scale Network Attacks on Cryptocurrencies. arXiv preprint arXiv:1605.07524 (2016)."},{"volume-title":"Branching processes","author":"Athreya Krishna B","key":"e_1_2_1_10_1","unstructured":"Krishna B Athreya and Peter E Ney . 2004. Branching processes . Courier Corporation . Krishna B Athreya and Peter E Ney. 2004. Branching processes. Courier Corporation."},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660379"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.15"},{"key":"e_1_2_1_13_1","volume-title":"Why criminals can't hide behind Bitcoin. Science","author":"Bohannon John","year":"2016","unstructured":"John Bohannon . 2016. Why criminals can't hide behind Bitcoin. Science ( 2016 ). John Bohannon. 2016. Why criminals can't hide behind Bitcoin. Science (2016)."},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3084459"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00206326"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10799-005-5879-y"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866346"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/1813084.1813118"},{"key":"e_1_2_1_19_1","volume-title":"Drac: An Architecture for Anonymous Low-Volume Communications.. In Privacy Enhancing Technologies","author":"Danezis George","year":"2010","unstructured":"George Danezis , Claudia Diaz , Carmela Troncoso , and Ben Laurie . 2010 . Drac: An Architecture for Anonymous Low-Volume Communications.. In Privacy Enhancing Technologies , Vol. 6205 . Springer , 202--219. George Danezis, Claudia Diaz, Carmela Troncoso, and Ben Laurie. 2010. Drac: An Architecture for Anonymous Low-Volume Communications.. In Privacy Enhancing Technologies, Vol. 6205. Springer, 202--219."},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251375.1251396"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2796314.2745866"},{"key":"e_1_2_1_22_1","volume-title":"Anonymity Properties of the Bitcoin P2P Network. arXiv preprint arXiv:1703.08761","author":"Fanti Giulia","year":"2017","unstructured":"Giulia Fanti and Pramod Viswanath . 2017. Anonymity Properties of the Bitcoin P2P Network. arXiv preprint arXiv:1703.08761 ( 2017 ). Giulia Fanti and Pramod Viswanath. 2017. Anonymity Properties of the Bitcoin P2P Network. arXiv preprint arXiv:1703.08761 (2017)."},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586137"},{"key":"e_1_2_1_24_1","volume-title":"Bitcoins Are Easier To Track Than You Think. Time (January","author":"Frizell Sam","year":"2015","unstructured":"Sam Frizell . 2015. Bitcoins Are Easier To Track Than You Think. Time (January 2015 ). Sam Frizell. 2015. Bitcoins Are Easier To Track Than You Think. Time (January 2015)."},{"key":"e_1_2_1_25_1","unstructured":"Adam Efe Gencer and Emin G\u00fcn Sirer. 2017. State of the Bitcoin Network. Hacking Distributed http:\/\/ hackingdistributed.com\/2017\/02\/15\/state-of-the-bitcoin-network\/. (February 2017).  Adam Efe Gencer and Emin G\u00fcn Sirer. 2017. State of the Bitcoin Network. Hacking Distributed http:\/\/ hackingdistributed.com\/2017\/02\/15\/state-of-the-bitcoin-network\/. (February 2017)."},{"key":"e_1_2_1_26_1","volume-title":"Herbivore: A scalable and efficient protocol for anonymous communication. Technical Report.","author":"Goel S.","year":"2003","unstructured":"S. Goel , M. Robson , M. Polte , and E. Sirer . 2003 . Herbivore: A scalable and efficient protocol for anonymous communication. Technical Report. S. Goel, M. Robson, M. Polte, and E. Sirer. 2003. Herbivore: A scalable and efficient protocol for anonymous communication. Technical Report."},{"key":"e_1_2_1_27_1","doi-asserted-by":"crossref","unstructured":"P. Golle and A. Juels. 2004. Dining cryptographers revisited. In Advances in Cryptology-Eurocrypt 2004.  P. Golle and A. Juels. 2004. Dining cryptographers revisited. In Advances in Cryptology-Eurocrypt 2004.","DOI":"10.1007\/978-3-540-24676-3_27"},{"key":"e_1_2_1_29_1","unstructured":"TE Jedusor. 2016. Mimblewimble. (2016).  TE Jedusor. 2016. Mimblewimble. (2016)."},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45472-5_30"},{"key":"e_1_2_1_32_1","unstructured":"Greg Maxwell. 2013. CoinJoin: Bitcoin privacy for the real world. In Post on Bitcoin Forum.  Greg Maxwell. 2013. CoinJoin: Bitcoin privacy for the real world. In Post on Bitcoin Forum."},{"key":"e_1_2_1_33_1","volume-title":"Mirai IoT Botnet: Mining for Bitcoins? SecurityIntelligence (April","author":"McMillen Dave","year":"2017","unstructured":"Dave McMillen . 2017. Mirai IoT Botnet: Mining for Bitcoins? SecurityIntelligence (April 2017 ). Dave McMillen. 2017. Mirai IoT Botnet: Mining for Bitcoins? SecurityIntelligence (April 2017)."},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504747"},{"volume-title":"Information, physics, and computation","author":"Mezard Marc","key":"e_1_2_1_35_1","unstructured":"Marc Mezard and Andrea Montanari . 2009. Information, physics, and computation . Oxford University Press . Marc Mezard and Andrea Montanari. 2009. Information, physics, and computation. Oxford University Press."},{"key":"e_1_2_1_36_1","unstructured":"Andrew Miller James Litton Andrew Pachulski Neal Gupta Dave Levin Neil Spring and Bobby Bhattacharjee. 2015. Discovering Bitcoin's public topology and influential nodes. (2015).  Andrew Miller James Litton Andrew Pachulski Neal Gupta Dave Levin Neil Spring and Bobby Bhattacharjee. 2015. Discovering Bitcoin's public topology and influential nodes. (2015)."},{"key":"e_1_2_1_37_1","volume-title":"Pisces: Anonymous communication using social networks. In NDSS. ACM.","author":"Mittal Prateek","year":"2013","unstructured":"Prateek Mittal , Matthew Wright , and Nikita Borisov . 2013 . Pisces: Anonymous communication using social networks. In NDSS. ACM. Prateek Mittal, Matthew Wright, and Nikita Borisov. 2013. Pisces: Anonymous communication using social networks. In NDSS. ACM."},{"key":"e_1_2_1_38_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system.","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto . 2008 . Bitcoin: A peer-to-peer electronic cash system. (2008). Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. (2008)."},{"key":"e_1_2_1_39_1","volume-title":"Structure and anonymity of the bitcoin transaction graph. Future internet 5, 2","author":"Ober Micha","year":"2013","unstructured":"Micha Ober , Stefan Katzenbeisser , and Kay Hamacher . 2013. Structure and anonymity of the bitcoin transaction graph. Future internet 5, 2 ( 2013 ), 237--250. Micha Ober, Stefan Katzenbeisser, and Kay Hamacher. 2013. Structure and anonymity of the bitcoin transaction graph. Future internet 5, 2 (2013), 237--250."},{"volume-title":"Computer networks: a systems approach","author":"Peterson Larry L","key":"e_1_2_1_40_1","unstructured":"Larry L Peterson and Bruce S Davie . 2007. Computer networks: a systems approach . Elsevier . Larry L Peterson and Bruce S Davie. 2007. Computer networks: a systems approach. Elsevier."},{"key":"e_1_2_1_41_1","doi-asserted-by":"crossref","unstructured":"P. C. Pinto P. Thiran and M. Vetterli. 2012. Locating the source of diffusion in large-scale networks. Physical review letters 109 6 (2012) 068702.  P. C. Pinto P. Thiran and M. Vetterli. 2012. Locating the source of diffusion in large-scale networks. Physical review letters 109 6 (2012) 068702.","DOI":"10.1103\/PhysRevLett.109.068702"},{"volume-title":"Security and privacy in social networks","author":"Reid Fergal","key":"e_1_2_1_42_1","unstructured":"Fergal Reid and Martin Harrigan . 2013. An analysis of anonymity in the bitcoin system . In Security and privacy in social networks . Springer , 197--223. Fergal Reid and Martin Harrigan. 2013. An analysis of anonymity in the bitcoin system. In Security and privacy in social networks. Springer, 197--223."},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/290163.290168"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39884-1_2"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11212-1_20"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.36"},{"volume-title":"Combinatorial optimization: polyhedra and efficiency","author":"Schrijver Alexander","key":"e_1_2_1_47_1","unstructured":"Alexander Schrijver . 2002. Combinatorial optimization: polyhedra and efficiency . Vol. 24 . Springer Science & Business Media . Alexander Schrijver. 2002. Combinatorial optimization: polyhedra and efficiency. Vol. 24. Springer Science & Business Media."},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.5555\/1140814.1140816"},{"key":"e_1_2_1_49_1","unstructured":"Jelle van den Hooff David Lazar Matei Zaharia and Nickolai Zeldovich. {n. d.}. Scalable Private Messaging Resistant to Traffic Analysis. ({n. d.}).  Jelle van den Hooff David Lazar Matei Zaharia and Nickolai Zeldovich. {n. d.}. Scalable Private Messaging Resistant to Traffic Analysis. ({n. d.})."},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2637364.2591993"},{"key":"e_1_2_1_51_1","unstructured":"David Isaac Wolinsky Henry Corrigan-Gibbs Bryan Ford and Aaron Johnson. 2012. Dissent in Numbers: Making Strong Anonymity Scale.. In OSDI. 179--182.   David Isaac Wolinsky Henry Corrigan-Gibbs Bryan Ford and Aaron Johnson. 2012. Dissent in Numbers: Making Strong Anonymity Scale.. In OSDI. 179--182."},{"key":"e_1_2_1_52_1","unstructured":"M. Zamani J. Saia M. Movahedi and J. Khoury. 2013. Towards provably-secure scalable anonymous broadcast. In USENIX FOCI.  M. Zamani J. Saia M. Movahedi and J. Khoury. 2013. Towards provably-secure scalable anonymous broadcast. In USENIX FOCI."},{"key":"e_1_2_1_53_1","volume-title":"Proceedings of ICN. Citeseer, 401--409","author":"Zantout Bassam","year":"2011","unstructured":"Bassam Zantout and Ramzi Haraty . 2011 . I2P data communication system . In Proceedings of ICN. Citeseer, 401--409 . Bassam Zantout and Ramzi Haraty. 2011. I2P data communication system. In Proceedings of ICN. Citeseer, 401--409."},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1186\/s40649-014-0003-2"}],"container-title":["Proceedings of the ACM on Measurement and Analysis of Computing Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3224424","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3224424","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3224424","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:39:06Z","timestamp":1750210746000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3224424"}},"subtitle":["Lightweight Cryptocurrency Networking with Formal Anonymity Guarantees"],"short-title":[],"issued":{"date-parts":[[2018,6,13]]},"references-count":52,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2018,6,13]]}},"alternative-id":["10.1145\/3224424"],"URL":"https:\/\/doi.org\/10.1145\/3224424","relation":{},"ISSN":["2476-1249"],"issn-type":[{"type":"electronic","value":"2476-1249"}],"subject":[],"published":{"date-parts":[[2018,6,13]]},"assertion":[{"value":"2018-06-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}